{"id":7828,"date":"2021-05-27T15:14:32","date_gmt":"2021-05-27T18:14:32","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7828"},"modified":"2021-05-27T15:14:32","modified_gmt":"2021-05-27T18:14:32","slug":"estados-unidos-presenta-proyectos-de-ley-para-proteger-la-infraestructura-critica-de-los-ciberataques","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7828","title":{"rendered":"Estados Unidos presenta proyectos de ley para proteger la infraestructura cr\u00edtica de los ciberataques"},"content":{"rendered":"<p>El Comit\u00e9 de Seguridad Nacional de la C\u00e1mara de Representantes de EE.UU. aprob\u00f3 cinco proyectos de ley bipartidistas el lunes para reforzar las capacidades de defensa contra los ataques cibern\u00e9ticos dirigidos a organizaciones e infraestructura cr\u00edtica del pa\u00eds.&gt;Estos proyectos de ley se presentaron como resultado directo de la supervisi\u00f3n del Comit\u00e9 de Seguridad Nacional de los recientes ciberataques, incluido el ataque de ransomware que oblig\u00f3 a Colonial Pipeline a cerrar el oleoducto m\u00e1s grande de EE.UU.<\/p>\n<hr \/>\n<p>The U.S. House Committee on Homeland Security has passed five bipartisan bills on Monday to bolster defense capabilities against cyber attacks targeting\u00a0U.S. organizations and critical infrastructure.<\/p>\n<p>These bills were introduced as a direct result of the Homeland Security Committee&#8217;s oversight of recent cyber attacks, including the ransomware attack that forced Colonial Pipeline to\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/tag\/colonial-pipeline\/\" target=\"_blank\" rel=\"noopener\">shut down the largest U.S. pipeline<\/a>.<\/p>\n<p>While Colonial Pipeline reportedly\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/colonial-pipeline-restores-operations-5-million-ransom-demanded\/\" target=\"_blank\" rel=\"noopener\">paid a $5 million ransom<\/a>, this didn&#8217;t stop a widescale fuel shortage that impacted multiple northeastern states.<\/p>\n<p>Another incident that prompted these bills is the\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/tag\/SolarWinds\/\" target=\"_blank\" rel=\"noopener\">SolarWinds supply-chain attack<\/a>\u00a0that provided Russian Foreign Intelligence Service (SVR) hackers with access to the networks of U.S. federal agencies and private tech sector companies.<\/p>\n<p>The\u00a0five bipartisan bills are also designed to make it easier to defend networks from cyber attacks using critical security vulnerabilities such as those abused in campaigns targeting vulnerable\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-gives-federal-agencies-5-days-to-find-hacked-exchange-servers\/\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange Server<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pulse-secure-vpn-zero-day-used-to-hack-defense-firms-govt-orgs\/\" target=\"_blank\" rel=\"noopener\">Pulse Connect Secure<\/a>\u00a0devices earlier this year.<\/p>\n<blockquote><p>Since the beginning of this Congress, this Committee has engaged in extensive oversight of these events and how the Federal government partners with others to defend our networks. The legislation we reported today was the result of this oversight. I am pleased that they received broad bipartisan support and hope they are considered on the House floor in short order. \u2014\u00a0<a href=\"https:\/\/homeland.house.gov\/imo\/media\/doc\/051821%20Markup%20Statement.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Chairman Bennie G. Thompson<\/a><\/p><\/blockquote>\n<p>Besides legislation to enhance US\u00a0pipeline security, the bills also authorize the Cybersecurity and Infrastructure Security Agency (CISA) to help secure SLTT networks and promote regular testing of cyber attack preparedness.<\/p>\n<p>&#8220;Other measures passed in today\u2019s markup include bills to help State and Local governments protect their networks, provide critical infrastructure owners and operators with mitigation strategies against critical vulnerabilities, and establish a national cyber exercise program to promote more regular testing of preparedness and resilience to cyber attacks against critical infrastructure,&#8221; the Committee\u00a0<a href=\"https:\/\/homeland.house.gov\/news\/legislation\/homeland-security-committee-passes-slate-of-bipartisan-bills-including-pipeline-security-and-cybersecurity-legislation\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a>\u00a0in a press release.<\/p>\n<p>The five bipartisan bills introduced in House on Monday include:<\/p>\n<ul>\n<li><a href=\"https:\/\/homeland.house.gov\/download\/bill51821cybersecurity-vulnerability-remediation-act\" target=\"_blank\" rel=\"nofollow noopener\"><strong>H.R. 2980, The \u201cCybersecurity Vulnerability Remediation Act\u201d<\/strong><\/a><strong>\u00a0&#8211;\u00a0<\/strong>authorizes CISA to assist critical infrastructure owners and operators with mitigation strategies against the most critical, known vulnerabilities,<\/li>\n<li><a href=\"https:\/\/homeland.house.gov\/download\/bill51821state-and-local-cybersecurity-improvement-act\" target=\"_blank\" rel=\"nofollow noopener\"><strong>H.R. 3138, The \u201cState and Local Cybersecurity Improvement Act\u201d<\/strong><\/a><strong>\u00a0&#8211;\u00a0<\/strong>seeks to authorize a new $500 million grant program to provide State and local, Tribal, and Territorial governments with dedicated funding to secure their networks from ransomware and other cyber attacks.<\/li>\n<li><a href=\"https:\/\/homeland.house.gov\/download\/bill51821cisa-cyber-exercise-act\" target=\"_blank\" rel=\"nofollow noopener\"><strong>H.R. 3223, The \u201cCISA Cyber Exercise Act\u201d<\/strong><\/a><strong>\u00a0&#8211;\u00a0<\/strong>establishes a National Cyber Exercise program within CISA to promote more regular testing and systemic assessments of preparedness and resilience to cyber attacks against critical infrastructure.<\/li>\n<li><a href=\"https:\/\/homeland.house.gov\/download\/pipeline-security-act-text\" target=\"_blank\" rel=\"nofollow noopener\"><strong>H.R. 3243, The \u201cPipeline Security Act\u201d<\/strong><\/a><strong>\u00a0&#8211;\u00a0<\/strong>enhances the ability of TSA\u2014the principal Federal entity responsible for pipeline security\u2014to guard pipeline systems against cyberattacks, terrorist attacks, and other threats. This measure codifies TSA\u2019s Pipeline Security Section and clarifies TSA\u2019s statutory mandate to protect pipeline infrastructure.<\/li>\n<li><a href=\"https:\/\/homeland.house.gov\/download\/domains-critical-to-homeland-security-act-text\" target=\"_blank\" rel=\"nofollow noopener\"><strong>H.R. 3264, The \u201cDomains Critical to Homeland Security Act\u201d<\/strong><\/a><strong>\u00a0&#8211;\u00a0<\/strong>authorizes DHS to conduct research and development into supply chain risks for critical domains of the United States economy and transmit the results to Congress.<\/li>\n<\/ul>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-introduces-bills-to-secure-critical-infrastructure-from-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.bleepingcomputer.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Comit\u00e9 de Seguridad Nacional de la C\u00e1mara de Representantes de EE.UU. aprob\u00f3 cinco proyectos de ley bipartidistas el lunes para reforzar las capacidades de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7828"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7828"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7828\/revisions"}],"predecessor-version":[{"id":7831,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7828\/revisions\/7831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7830"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}